Access control

MedStack Confidential

Metadata

Automate access control management for access

CodeSectionTitle
ISO A.9.4.1 Information access restriction
ISO A.9.2.4 Management of secret authentication information of users
HIPAA 164.308(a)(4)(ii)(C) Access establishment and modification (Addressable)

Grant, modify, and terminate user access

CodeSectionTitle
ISO A.9.1.2 Access to networks and network services
ISO A.9.2.1 User registration and de-registration
ISO A.9.2.2 User access provisioning
ISO A.9.2.3 Management of privileged access rights
ISO A.9.2.6 Removal or adjustment of access rights
CHI SR60 Timely Revocation of Access Privileges
HIPAA 164.308(a)(4)(ii)(B) Access authorization (Addressable)

Secret authentication information

CodeSectionTitle
ISO A.9.3.1 Use of secret authentication information
ISO A.9.4.3 Password management system
HIPAA 164.308(a)(5)(ii)(D) Password management (Addressable)

Logging in and out

CodeSectionTitle
ISO A.9.4.2 Secure log-on procedures
HIPAA 164.312(a)(2)(iii) Automatic logoff (Addressable)
HIPAA 164.312(d) Standard: Person or entity authentication
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Restrict use of admin utilities

CodeSectionTitle
ISO A.9.4.4 Use of privileged utility programs
CHI SR68 Controlling Access to EHRi System Utilities

Review access grants regularly

CodeSectionTitle
ISO A.9.2.5 Review of user access rights
CHI SR56 Reviewing User Registration Details
SOC2 CC6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.

Unique user IDs

CodeSectionTitle
HIPAA 164.312(a)(2)(i) Unique user identification (Required)

Enforcement

References

CodeSectionTitle
ISO A.9 Access control
ISO A.9.1 Business requirements for access control
ISO A.9.1.1 Access control policy
ISO A.9.2 User access management
ISO A.9.3 User responsibilities
ISO A.9.4 System and application access control
HIPAA 164.308(a)(4)(i) Standard: Information access management
HIPAA 164.308(a)(4)(ii)(A) Isolating health care clearinghouse functions (Required)
HIPAA 164.312(a) Standard: Access control
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Asset management

MedStack Confidential

Metadata

Maintain an asset inventory

CodeSectionTitle
ISO A.8.1.1 Inventory of assets
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Use company-owned assets

CodeSectionTitle
ISO A.8.1.2 Ownership of assets

Acceptable Use for employees

CodeSectionTitle
ISO A.8.1.3 Acceptable use of assets

Return organizational assets upon

CodeSectionTitle
ISO A.8.1.4 Return of assets

Manage the installation of software

CodeSectionTitle
ISO A.12.6.2 Restrictions on software installation
SOC2 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.

Enforcement

References

CodeSectionTitle
ISO A.8.1 Responsibility for assets
CHI SR8 Responsibility for information assets

Awareness, training, and reminders

MedStack Confidential

Metadata

Foster awareness of compliance

CodeSectionTitle
ISO A.6.1.4 Contact with special interest groups
HIPAA 164.308(a)(5)(ii)(A) Security reminders (Addressable)

Notify users of their responsibilities

CodeSectionTitle
ISO A.7.2.1 Management responsibilities

Provide compliance training that is clear and complete

CodeSectionTitle
ISO A.7.2.2 Information security awareness, education and training
CHI SR15 Training users and raising security awareness
SOC2 CC1.1 Establishes Standards of Conduct
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.

Run simulated tabletop information security incident training

Third-party resources

Enforcement

References

CodeSectionTitle
ISO A.7.2 During employment
HIPAA 164.308(a)(5)(i) Standard: Security awareness and training
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.

Backup

MedStack Confidential

Metadata

Create and maintain integrous backups

Automatically create point-in-time backups

Automatically validate backup management

Restrict access to backups

Enforcement

References

CodeSectionTitle
ISO A.12.3 Backup
ISO A.12.3.1 Information backup
CHI SR29 Securely Backing Up Data
HIPAA 164.308(a)(7)(ii)(A) Data backup plan (Required)
HIPAA 164.308(a)(7)(ii)(B) Disaster recovery plan (Required)
HIPAA 164.310(d)(2)(iv) Data backup and storage (Addressable)
HIPAA 164.312(c)(1) Standard: Integrity
HIPAA 164.312(c)(2) Implementation specification: Mechanism to authenticate electronic protected health information (Addressable)
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.
SOC2 A1.3 The entity tests recovery plan procedures supporting system recovery to meet its objectives.
SOC2 PI1.5 The entity implements policies and procedures to store inputs, items in processing, and outputs completely, accurately, and timely in accordance with system specifications to meet the entity’s objectives.

Compliance

MedStack Confidential

Metadata

Comply with the appropriate regional regulations

CodeSectionTitle
HIPAA 45 CFR Part 160, Subpart B (§§ 160.201 - 160.205) Preemption of State Law

Comply with contractual requirements

Who is accountable and responsible

CodeSectionTitle
HIPAA 164.308(a)(2) Standard: Assigned security responsibility
SOC2 CC1.1 COSO Principle 1: The entity demonstrates a commitment to integrity and ethical values.
SOC2 CC1.2 COSO Principle 2: The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control.
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
SOC2 CC5.3 COSO Principle 12: The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action.

Handle investigations, complaints and rights

HIPAA and state law preemption in the United States

Enforcement

References

CodeSectionTitle
ISO A.18.1 Compliance with legal and contractual requirements
ISO A.18.1.1 Identification of applicable legislation and contractual requirements
ISO A.18.1.3 Protection of records
SOC2 CC3.1 COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
SOC2 CC3.1 COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
SOC2 CC3.1 COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.

Continuity

MedStack Confidential

Metadata

Ensure continuity of operational systems during adverse situations

Ensure continuity of employee operations during adverse situations

Activate Emergency Mode

CodeSectionTitle
HIPAA 164.308(a)(7)(ii)(C) Emergency mode operation plan (Required)

Treat systems in order of criticality

Train, test and revise continuity plans

CodeSectionTitle
ISO A.17.1.3 Verify, review and evaluate information security continuity
HIPAA 164.308(a)(7)(ii)(D) Testing and revision procedures (Addressable)
SOC2 A1.3 The entity tests recovery plan procedures supporting system recovery to meet its objectives.

Enforcement

References

CodeSectionTitle
ISO A.17.1 Information security continuity
ISO A.17.1.1 Planning information security continuity
ISO A.17.1.2 Implementing information security continuity
CHI SR86 Testing Business Continuity Plans
HIPAA 164.308(a)(7)(i) Standard: Contingency plan
HIPAA 164.312(a)(2)(ii) Emergency access procedure (Required)
SOC2 CC7.5 The entity identifies, develops, and implements activities to recover from identified security incidents.
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.

Cryptography

MedStack Confidential

Metadata

Use the best reasonably available cipher strength and key length

Use current standard open-source and vendor cryptographic methods and implementations

CodeSectionTitle
OWASP Cryptographic Storage Cheat Sheet Algorithms
OWASP Cryptographic Storage Cheat Sheet Custom Algorithms

Encrypt all data at rest

Encrypt all data in transit

CodeSectionTitle
PCI-DSS Requirement 4 Encrypt transmission of cardholder data across open, public networks
HIPAA 164.312(e)(1) Standard: Transmission security
HIPAA 164.312(e)(2)(i) Integrity controls (Addressable)
HIPAA 164.312(e)(2)(ii) Encryption (Addressable)

Manage cryptographic keys

CodeSectionTitle
ISO A.10.1.2 Key management
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Use certificates to authenticate keys

Legal compliance

CodeSectionTitle
ISO A.18.1.5 Regulation of cryptographic controls

Enforcement

References

CodeSectionTitle
ISO A.10.1 Cryptographic controls
ISO A.10.1.1 Policy on the use of cryptographic controls
HIPAA 164.312(a)(2)(iv) Encryption and decryption (Addressable)
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Definitions

MedStack Confidential

Metadata

Applicability

BA

Backup System

Breach

Cloud Provider

Customer

EHRi

Employee

HIPAA

ISMP

Maturity level (in _metadata)

Media

Mobile devices

Operational systems

Password

PCI DSS

PHI

CodeSectionTitle
HIPAA 160.103 Definitions Individually identifiable health information

PII

CodeSectionTitle
U.S. Code of Federal Regulations 2 CFR § 200.79 Personally Identifiable Information (PII)
NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
GDPR Article 4(1) personal data
PIPEDA 2(1) personal information

PoS

Secret Key

Server

SLA

Telework

Unsecured protected health information

Vendor

Employees

References

CodeSectionTitle
HIPAA 160.103 Definitions

Disciplinary process

MedStack Confidential

Metadata

Appropriate, fair and consistent sanctions can

Apply appropriate sanctions

Determine sanction severity based on the following factors

Apply sanctions in increasing order of severity

Do not apply sanctions

Immediate termination is justified for

Incidents involving customers or suppliers

Enforcement

References

CodeSectionTitle
ISO A.7.2.3 Disciplinary process
HIPAA 164.308(a)(1)(ii)(C) Sanction policy (Required)
SOC2 CC1.1 COSO Principle 1: The entity demonstrates a commitment to integrity and ethical values.
SOC2 CC1.5 COSO Principle 5: The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
SOC2 CC1.5 COSO Principle 5: The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.

Documentation

MedStack Confidential

Metadata

Policies and procedures

CodeSectionTitle
ISO A.5.1.1 Policies for information security
ISO A.5.1.2 Review of the policies for information security
HIPAA 164.316(a) Standard: Policies and procedures
HIPAA 164.316(b)(2)(ii) Updates (Required)
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
SOC2 CC5.3 COSO Principle 12: The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action.
SOC2 CC5.3 COSO Principle 12: The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action.

Documentation

CodeSectionTitle
HIPAA 164.316(b)(1) Standard: Documentation
HIPAA 164.316(b)(2)(ii) Availability (Required)

Retain compliance documentation

CodeSectionTitle
HIPAA 164.316(b)(2)(i) Time limit (Required)

Enforcement

References

CodeSectionTitle
ISO A.5 Information security policies
ISO A.5.1 Management direction for information security

Human resource security

MedStack Confidential

Metadata

Screen employees prior to hiring

CodeSectionTitle
ISO A.7.1.1 Screening
HIPAA 164.308(a)(3)(ii)(B) Workforce clearance procedure (Addressable)
CHI SR13 Verifying the identity of users
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.

Workforce contracts

CodeSectionTitle
ISO A.7.1.2 Terms and conditions of employment
CHI SR11 Addressing user responsiblities in job descriptions
CHI SR12 Addressing user responsibillities in Terms of Employment
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.

Authorize minimum necessary access to PHI

CodeSectionTitle
HIPAA 164.308(a)(3)(ii)(A) Authorization and/or supervision (Addressable)

Terminate employee authorization

CodeSectionTitle
ISO A.7.3.1 Termination or change of employment responsibilities
HIPAA 164.308(a)(3)(ii)(C) Termination procedures (Addressable)

Upon termination, require return of all physical assets

CodeSectionTitle
ISO A.8.1.4 Return of assets

Enforcement

References

CodeSectionTitle
ISO A.7 Human resource security
ISO A.7.1 Prior to employment
ISO A.7.3 Termination and change of employment
HIPAA 164.308(a)(3) Standard: Workforce security
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.

Information classification

MedStack Confidential

Metadata

Document customer criticality

Enforcement

References

CodeSectionTitle
ISO A.8.2 Information classification
ISO A.8.2.1 Classification of information
ISO A.8.2.2 Labelling of information
ISO A.8.2.3 Handling of assets
HIPAA 164.308(a)(7)(ii)(E) Contingency plan
SOC2 CC3.2 COSO Principle 7: The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.
SOC2 P6.7 The entity provides data subjects with an accounting of the personal information held and disclosure of the data subjects’ personal information, upon the data subjects’ request, to meet the entity’s objectives related to privacy.
SOC2 C1.1 The entity identifies and maintains confidential information to meet the entity’s objectives related to confidentiality.

Information privacy

MedStack Confidential

Metadata

General

We do not directly collect, use or disclose PHI

CodeSectionTitle
HIPAA 45 CFR Subpart D (§§ 164.400 - 164.414) Notification in the Case of Breach of Unsecured Protected Health Information
HIPAA 45 CFR Subpart E (§§ 164.500 - 164.534) Privacy of Individually Identifiable Health Information

Access customer content only to maintain or provide our services

Safeguard privacy

Publish a Privacy Notice

Inquiries, complaints, and disputes from data subjects

Implement an Information Privacy Program

Verify compliance

Enforcement

References

CodeSectionTitle
ISO A.18.1.4 Privacy and protection of personally identifiable information
CHI PR1 Accountable Person
CHI PR3 Privacy Policy
Canadian Standards Association (CSA) Model Code for the Protection of Personal Information
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 P1.1 The entity provides notice to data subjects about its privacy practices to meet the entity’s objectives related to privacy. The notice is updated and communicated to data subjects in a timely manner for changes to the entity’s privacy practices, including changes in the use of personal information, to meet the entity’s objectives related to privacy.
SOC2 P1.1 The entity provides notice to data subjects about its privacy practices to meet the entity’s objectives related to privacy. The notice is updated and communicated to data subjects in a timely manner for changes to the entity’s privacy practices, including changes in the use of personal information, to meet the entity’s objectives related to privacy.
SOC2 P2.1 The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information to the data subjects and the consequences, if any, of each choice. Explicit consent for the collection, use, retention, disclosure, and disposal of personal information is obtained from data subjects or other authorized persons, if required. Such consent is obtained only for the intended purpose of the information to meet the entity’s objectives related to privacy. The entity’s basis for determining implicit consent for the collection, use, retention, disclosure, and disposal of personal information is documented.
SOC2 P2.1 The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information to the data subjects and the consequences, if any, of each choice. Explicit consent for the collection, use, retention, disclosure, and disposal of personal information is obtained from data subjects or other authorized persons, if required. Such consent is obtained only for the intended purpose of the information to meet the entity’s objectives related to privacy. The entity’s basis for determining implicit consent for the collection, use, retention, disclosure, and disposal of personal information is documented.
SOC2 P3.1 Personal information is collected consistent with the entity’s objectives related to privacy.
SOC2 P3.2 For information requiring explicit consent, the entity communicates the need for such consent, as well as the consequences of a failure to provide consent for the request for personal information, and obtains the consent prior to the collection of the information to meet the entity’s objectives related to privacy.
SOC2 P4.1 The entity limits the use of personal information to the purposes identified in the entity’s objectives related to privacy.
SOC2 P4.2 The entity retains personal information consistent with the entity’s objectives related to privacy.
SOC2 P4.2 The entity retains personal information consistent with the entity’s objectives related to privacy.
SOC2 P5.1 The entity grants identified and authenticated data subjects the ability to access their stored personal information for review and, upon request, provides physical or electronic copies of that information to data subjects to meet the entity’s objectives related to privacy. If access is denied, data subjects are informed of the denial and reason for such denial, as required, to meet the entity’s objectives related to privacy.
SOC2 P5.2 The entity corrects, amends, or appends personal information based on information provided by data subjects and communicates such information to third parties, as committed or required, to meet the entity’s objectives related to privacy. If a request for correction is denied, data subjects are informed of the denial and reason for such denial to meet the entity’s objectives related to privacy.
SOC2 P6.1 The entity discloses personal information to third parties with the explicit consent of data subjects, and such consent is obtained prior to disclosure to meet the entity’s objectives related to privacy.
SOC2 P6.4 The entity obtains privacy commitments from vendors and other third parties who have access to personal information to meet the entity’s objectives related to privacy. The entity assesses those parties’ compliance on a periodic and as-needed basis and takes corrective action, if necessary.
SOC2 P8.1 The entity implements a process for receiving, addressing, resolving, and communicating the resolution of inquiries, complaints, and disputes from data subjects and others and periodically monitors compliance to meet the entity’s objectives related to privacy. Corrections and other necessary actions related to identified deficiencies are made or taken in a timely manner.
SOC2 P8.1 The entity implements a process for receiving, addressing, resolving, and communicating the resolution of inquiries, complaints, and disputes from data subjects and others and periodically monitors compliance to meet the entity’s objectives related to privacy. Corrections and other necessary actions related to identified deficiencies are made or taken in a timely manner.

Information security

MedStack Confidential

Metadata

Guide ourselves using an Information Security Management Program based on ISO/IEC 27002:2013

Meet our responsibilities for protecting data

Protect and secure all of our information system assets

Align the ISMP with our goals and processes

Continuously improve our policies

Verify compliance to this policy

Report problems

Exceptions

Enforcement

Non-compliance

References

CodeSectionTitle
ISO A.6 Organization of information security
ISO A.6.1 Internal organization
ISO A.6.1.1 Information security roles and responsibilities
ISO A.6.1.2 Segregation of duties
ISO A.6.1.5 Information security in project management
CHI SR2 Security Policy
CHI SR3 Information security management, coordination and allocation of responsibilities
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
SOC2 CC1.5 COSO Principle 5: The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
SOC2 CC5.1 COSO Principle 10: The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
SOC2 CC6.3 The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity’s objectives.

Information security incidents

MedStack Confidential

Metadata

Use automated systems to detect, log, and alert on suspicious activity

Immediately respond upon detection

CodeSectionTitle
ISO A.16.1.1 Responsibilities and procedures
ISO A.16.1.2 Reporting information security events
ISO A.16.1.4 Assessment of and decision on information security events
ISO A.16.1.5 Response to information security incidents
ISO A.16.1.7 Collection of evidence
SOC2 CC7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.
SOC2 CC7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
SOC2 CC7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC7.2 The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.
SOC2 CC7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.
SOC2 P6.5 The entity obtains commitments from vendors and other third parties with access to personal information to notify the entity in the event of actual or suspected unauthorized disclosures of personal information. Such notifications are reported to appropriate personnel and acted on in accordance with established incident response procedures to meet the entity’s objectives related to privacy.
SOC2 P6.6 The entity provides notification of breaches and incidents to affected data subjects, regulators, and others to meet the entity’s objectives related to privacy.
SOC2 CC7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.
SOC2 CC7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.
SOC2 CC7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
SOC2 CC7.5 The entity identifies, develops, and implements activities to recover from identified security incidents.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
SOC2 CC7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
SOC2 CC7.5 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.

Notify the appropriate parties when any breach of PII or PHI occurs

CodeSectionTitle
ISO A.6.1.3 Contact with authorities
HIPAA 164.41 Notification by a business associate
HIPAA 164.412 Law enforcement delay
GDPR Article 33 Notification of a personal data breach to the supervisory authority
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.

Analyse and document

CodeSectionTitle
ISO A.16.1.6 Learning from information security incidents
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC7.5 The entity identifies, develops, and implements activities to recover from identified security incidents.

Require notifications from suppliers

Report weaknesses

CodeSectionTitle
ISO A.16.1.3 Reporting information security weaknesses
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.
SOC2 CC4.2 COSO Principle 17: The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.
SOC2 CC7.2 The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.
SOC2 CC7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.

Enforcement

References

CodeSectionTitle
ISO A.16.1 Management of information security incidents and improvements
CHI SR83 Reporting Security Incidents Involving the EHRi
CHI SR84 Responding to Security Incidents Involving the EHRi
HIPAA 164.308(a)(6)(i) Standard: Security incident procedures
HIPAA 164.308(a)(6)(ii) Response and reporting (Required)

Information transfer

MedStack Confidential

Metadata

Document information transfer security in agreements

CodeSectionTitle
ISO A.13.2.2 Agreements on information transfer

Cryptographically secure and sign communications

CodeSectionTitle
ISO A.13.2.3 Electronic messaging
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Document non-disclosure requirements in agreements

CodeSectionTitle
ISO A.13.2.4 Confidentiality or non-disclosure agreements

Enforcement

References

CodeSectionTitle
ISO A.13.2 Information transfer
ISO A.13.2.1 Information transfer policies and procedures
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Logging and monitoring

MedStack Confidential

Metadata

Log events automatically on all operational systems

CodeSectionTitle
ISO A.12.4.1 Event logging
ISO A.12.4.3 Administrator and operator logs
HIPAA 164.308(a)(5)(ii)(C) Log-in monitoring (Addressable)
SOC2 CC7.2 The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.

Log service activity on all systems that handle PHI

Protect the logs

CodeSectionTitle
ISO A.12.4.2 Protection of log information

Retain logs until whichever comes first

CodeSectionTitle
NIST Special Publication 800-92 Guide to Computer Security Log Management

Synchronize the clocks of servers

CodeSectionTitle
ISO A.12.4.4 Clock synchronisation

Enforcement

References

CodeSectionTitle
ISO A.12.4 Logging and monitoring
HIPAA 164.308(a)(1)(ii)(D) Information system activity review (Required)
HIPAA 164.312(b) Standard: Audit controls
OWASP Logging Cheat Sheet
NIST Special Publication 800-92 Guide to Computer Security Log Management

Malware protection

MedStack Confidential

Metadata

Do not require server-level malware protection on Linux servers

CodeSectionTitle
SANS Server Malware Protection Policy Policy

Run malware protection on workstations

CodeSectionTitle
ISO A.12.2.1 Controls against malware
NIST SC-18 Mobile Code
SOC2 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.

When malware is detected

Enforcement

References

CodeSectionTitle
ISO A.12.2 Protection from malware
HIPAA 164.308(a)(5)(ii)(B) Protection from malicious software (Addressable)
CHI SR28 Protecting Against Malware

Media handling

MedStack Confidential

Metadata

Erase or destroy media containing PHI prior to disposal or re-use to prevent data from being recovered

CodeSectionTitle
ISO A.8.3.1 Management of removable media
ISO A.8.3.2 Disposal of media
CHI SR34 Disposing of Media Containing PHI
HIPAA 164.310(d)(2)(i) Disposal (Required)
HIPAA 164.310(d)(2)(ii) Media re-use (Required)
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Don’t put sensitive data on removable media

CodeSectionTitle
ISO A.8.3.3 Physical media transfer
CHI SR33 Protecting PHI on Portable Media
CHI SR35 Protecting Data Storage
CHI SR36 Protecting Storage of Unencrypted PHI in the EHRi
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Enforcement

References

CodeSectionTitle
ISO A.8.3 Media handling
ISO A.11.2.7 Secure disposal or re-use of equipment
HIPAA 164.310(d)(1) Standard: Device and media controls
HIPAA 164.310(d)(2)(iii) Accountability (Addressable)
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Mobile devices and teleworking

MedStack Confidential

Metadata

Be secure while teleworking

CodeSectionTitle
ISO A.6.2.2 Teleworking

Mobile devices

CodeSectionTitle
ISO A.6.2.1 Mobile device policy
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Enforcement

References

CodeSectionTitle
ISO A.6.2 Mobile devices and teleworking
ISO A.11.2.6 Security of equipment and assets off-premises

Network security management

MedStack Confidential

Metadata

Manage and control networks

CodeSectionTitle
ISO A.13.1.1 Network controls
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Segregate the networks of each each customer using virtual networks

CodeSectionTitle
ISO A.13.1.3 Segregation in networks
CHI SR66 Segregating EHRi Network Users, Services and Systems
CHI SR67 Controlling Routing on EHRi Networks
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Use firewalls on all virtual networks and servers

CodeSectionTitle
CHI SR65 Controlling Access to EHRi Network Diagnostics and Network Management Services
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Enforcement

References

CodeSectionTitle
ISO A.13.1 Network Security Management
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Risk management

MedStack Confidential

Metadata

Perform risk management

Maintain a continuous cadence of risk management assessments and tests

CodeSectionTitle
HIPAA 164.308(a)(8) Standard: Evaluation

Acquire and maintain independent certifications

Acquire and maintain independent risk assessments

CodeSectionTitle
ISO 8.2 Information security risk assessment

Acquire and maintain independent security tests

Perform internal reviews and assessments of information security risk

CodeSectionTitle
ISO A.18.2.2 Compliance with security policies and standards
ISO A.18.2.3 Technical compliance review
SOC2 CC4.1 COSO Principle 16: The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.

Distribute the results of reviews to

CodeSectionTitle
SOC2 CC4.2 COSO Principle 17: The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.

Manage and treat risk

Enforcement

References

CodeSectionTitle
ISO 8.3 Information security risk treatment
ISO A.18.2 Information security reviews
ISO A.18.2.1 Independent review of information security
CHI SR1 Threat and Risk Assessment
CHI SR4 Independent Review of Security Policy Implementation
HIPAA 164.308(a)(1)(i) Standard: Security management process
HIPAA 164.308(a)(1)(ii)(A) Risk analysis (Required)
HIPAA 164.308(a)(1)(ii)(B) Risk management (Required)
SOC2 CC4.1 COSO Principle 16: The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.
SOC2 CC4.1 COSO Principle 16: The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.
SOC2 CC4.1 COSO Principle 16: The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.
SOC2 P8.1 The entity implements a process for receiving, addressing, resolving, and communicating the resolution of inquiries, complaints, and disputes from data subjects and others and periodically monitors compliance to meet the entity’s objectives related to privacy. Corrections and other necessary actions related to identified deficiencies are made or taken in a timely manner.

Secure areas

MedStack Confidential

Metadata

Delegate the physical security of all operational systems, facilities, and equipment to major cloud providers

CodeSectionTitle
ISO A.11.1 Secure areas
ISO A.11.1.1 Physical security perimeter
ISO A.11.1.2 Physical entry controls
ISO A.11.1.3 Securing offices, rooms and facilities
ISO A.11.1.4 Protecting against external and environmental threats
ISO A.11.1.5 Working in secure areas
ISO A.11.1.6 Delivery and loading areas
CHI SR17 Physically securing EHRi systems
HIPAA 164.310(a)(1) Standard: Facility access controls
SOC2 CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, back-up media storage, and other sensitive locations) to authorized personnel to meet the entity’s objectives.
SOC2 CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, back-up media storage, and other sensitive locations) to authorized personnel to meet the entity’s objectives.

Delegate the physical management and ownership of all operational systems, facilities, and equipment to major cloud providers

CodeSectionTitle
ISO A.11.2 Equipment
ISO A.11.2.1 Equipment siting and protection
ISO A.11.2.2 Supporting utilities
ISO A.11.2.3 Cabling security
ISO A.11.2.4 Equipment maintenance
ISO A.11.2.5 Removal of assets
HIPAA 164.310(a)(2)(i) Contingency operations (Addressable)
HIPAA 164.310(a)(2)(ii) Contingency operations
HIPAA 164.310(a)(2)(iii) Access control and validation procedures (Addressable)
HIPAA 164.310(a)(2)(iv) Maintenance records
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.

Enforcement

References

Software development and operations

MedStack Confidential

Metadata

Applicability

To conduct software development and operations

CodeSectionTitle
ISO A.12.1 Operational procedures and responsibilities
ISO A.12.5 Control of operational software
ISO A.14 System acquisition, development and maintenance
ISO A.14.2 Security in development and support processes

Implement all operations activities as software development

CodeSectionTitle
ISO A.12.1.1 Documented operating procedures
ISO A.12.1.2 Change management
ISO A.12.5.1 Installation of software on operational systems
SOC2 CC2.1 COSO Principle 13: The entity obtains or generates and uses relevant, quality information to support the functioning of internal control.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC2.2 COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
SOC2 CC3.4 COSO Principle 9: The entity identifies and assesses changes that could significantly impact the system of internal control.
SOC2 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 PI1.1 The entity obtains or generates, uses, and communicates relevant, quality information regarding the objectives related to processing, including definitions of data processed and product and service specifications, to support the use of products and services.
SOC2 PI1.1 The entity obtains or generates, uses, and communicates relevant, quality information regarding the objectives related to processing, including definitions of data processed and product and service specifications, to support the use of products and services.

Make security a key part of software development and operations

CodeSectionTitle
ISO A.12.6.1 Management of technical vulnerabilities
ISO A.12.7.1 Information systems audit controls
ISO A.14.1 Security requirements of information systems
ISO A.14.1.1 Information security requirements analysis and specification
ISO A.14.1.2 Securing application services on public networks
ISO A.14.1.3 Protecting application services transactions
ISO A.14.2.1 Secure development policy
ISO A.14.2.4 Restrictions on changes to software packages
ISO A.14.2.5 Secure system engineering principles
ISO A.14.2.6 Secure development environment
Privacy by Design
OWASP Security by Design Principles
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.
SOC2 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.
SOC2 CC7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

Control changes to software and systems

CodeSectionTitle
ISO A.14.2.2 System change control procedures

Operate reliable systems with appropriate redundancy and availability

CodeSectionTitle
ISO A.12.1.3 Capacity management
ISO A.17.2.1 Availability of information processing facilities
SOC2 A1.1 The entity maintains, monitors, and evaluates current processing capacity and use of system components (infrastructure, data, and software) to manage capacity demand and to enable the implementation of additional capacity to help meet its objectives.
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.

Perform testing of software

CodeSectionTitle
ISO A.12.1.4 Separation of development, testing and operational environments
ISO A.14.2.3 Technical review of applications after operating platform changes
ISO A.14.2.8 System security testing
ISO A.14.2.9 System acceptance testing
ISO A.14.3 Test data
ISO A.14.3.1 Protection of test data
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

Have PHI only on production systems

Do not outsource software development and operations

CodeSectionTitle
ISO A.14.2.7 Outsourced development
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.

Respect Intellectual Property Rights and licenses

CodeSectionTitle
ISO A.18.1.2 Intellectual property rights
SOC2 CC3.1 COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.

Enforcement

References

CodeSectionTitle
ISO A.9.4.5 Access control to program source code
ISO A.12.6 Technical vulnerability management
ISO A.17.2 Redundancies
CHI SR80 Implementing Software and Upgrades in the EHRi
CHI SR81 Protecting EHRi Software
CHI SR82 Managing Known Vulnerabilities
SOC 2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

Suppliers

MedStack Confidential

Metadata

Ensure suppliers and vendors have appropriate safeguards

CodeSectionTitle
ISO A.15.1.1 Information security policy for supplier relationships
ISO A.15.1.2 Addressing security within supplier agreements
ISO A.15.1.3 Information and communication technology supply chain
ISO A.15.2.1 Monitoring and review of supplier services
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.
SOC2 CC3.2 COSO Principle 7: The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.
SOC2 CC3.2 COSO Principle 7: The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.
SOC2 CC3.2 COSO Principle 7: The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.
SOC2 CC4.2 COSO Principle 17: The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 P6.5 The entity obtains commitments from vendors and other third parties with access to personal information to notify the entity in the event of actual or suspected unauthorized disclosures of personal information. Such notifications are reported to appropriate personnel and acted on in accordance with established incident response procedures to meet the entity’s objectives related to privacy.

Document security mechanisms, SLAs and management information in agreements

CodeSectionTitle
ISO A.13.1.2 Security of network services

Business Associate suppliers

CodeSectionTitle
HIPAA 164.308(b) Business associate contracts and other arrangements
HIPAA 164.314(a) Standard: Business associate contracts or other arrangements

Enforcement

References

CodeSectionTitle
ISO A.15.1 Information security in supplier relationships
ISO A.15.2 Supplier service delivery management
ISO A.15.2.2 Managing changes to supplier services
CHI PR2 Third-Party Agreements
CHI SR6 Addressing security in third-party agreements
SOC2 CC2.3 COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.
SOC2 CC8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.
SOC2 CC9.2 The entity assesses and manages risks associated with vendors and business partners.
SOC2 P1.1 The entity provides notice to data subjects about its privacy practices to meet the entity’s objectives related to privacy. The notice is updated and communicated to data subjects in a timely manner for changes to the entity’s privacy practices, including changes in the use of personal information, to meet the entity’s objectives related to privacy.
SOC2 P2.1 The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information to the data subjects and the consequences, if any, of each choice. Explicit consent for the collection, use, retention, disclosure, and disposal of personal information is obtained from data subjects or other authorized persons, if required. Such consent is obtained only for the intended purpose of the information to meet the entity’s objectives related to privacy. The entity’s basis for determining implicit consent for the collection, use, retention, disclosure, and disposal of personal information is documented.
SOC2 P6.1 The entity discloses personal information to third parties with the explicit consent of data subjects, and such consent is obtained prior to disclosure to meet the entity’s objectives related to privacy.
SOC2 P6.4 The entity obtains privacy commitments from vendors and other third parties who have access to personal information to meet the entity’s objectives related to privacy. The entity assesses those parties’ compliance on a periodic and as-needed basis and takes corrective action, if necessary.

Workstation

MedStack Confidential

Metadata

Automatically manage workstation computers using Mobile Device Management (MDM) software

Protect information from unauthorized view

Enforcement

References

CodeSectionTitle
ISO A.11.2.8 Unattended user equipment
ISO A.11.2.9 Clear desk and clear screen policy
HIPAA 164.310(b) Standard: Workstation use
HIPAA 164.310(c) Standard: Workstation security
SOC2 CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, back-up media storage, and other sensitive locations) to authorized personnel to meet the entity’s objectives.
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 A1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.